0x4141414141 / Malware-DevlopmentLinks
Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C
☆39Updated 6 years ago
Alternatives and similar repositories for Malware-Devlopment
Users that are interested in Malware-Devlopment are comparing it to the libraries listed below
Sorting:
- Windows Administrator level Implant.☆50Updated last year
- Docker container for running CobaltStrike 4.10☆38Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Updated 2 months ago
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- ☆59Updated last year
- EvtPsst☆55Updated 2 years ago
- A small red team course☆40Updated 2 years ago
- ☆36Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- ☆61Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Updated last year
- ☆59Updated last year
- ☆108Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- Source code and examples for PassiveAggression☆64Updated last year
- ☆43Updated last year
- ☆38Updated 2 years ago
- in-process powershell runner for BRC4☆48Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Detect userland hooks placed by AV/EDR☆28Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- ☆86Updated 3 years ago
- ☆35Updated 2 years ago
- Explore and filter your GitHub starred repositories☆25Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Updated last year